Ui selects IDi and pwi, computes H_PWi=h(pwi) and sends the regis

Ui selects IDi and pwi, computes H_PWi=h(pwi) and sends the registration request IDi,h(pwi) to GW. Then, GW personalizes a smart card for Ui and sends it to Ui. Figure 1 shows the registration phase of Vaidya et al.’s scheme.Figure 1.Registration phase of Vaidya et al.’s scheme [12].R-1Ui selects IDi and.PWiR-2Ui computes H_PWi=h(pwi)Ui sends a registration request IDi, H_PWi to GW in secure channels (it was not mentioned whether the registration request from Ui to GW is sent by secure channels [12], but we guess that it is sent this way).R-3GW computes the following when it receives the registration request from Ui.Ai=h(IDiH_PWixs)h(K)Bi=h(H_PWixs)Ci=xsh(IDsH_PWi)GW personalizes the smart card with IDs, IDi, h(?), Ai, Bi and Ci.GW sends the smart card to Ui in secure channels.

Meanwhile, SIDj and a secret value xs generated by GW are stored in Sj before it is deployed into a target field.2.2. Login PhaseThe login phase begins when Ui inserts Ui’s smart card into a terminal and inputs IDi* and pwi*. In this phase, Ui sends the authentication request to GW. Figure 2 illustrates the login phase of Vaidya et al.’s scheme.Figure 2.Login phase of Vaidya et al.’s scheme [12].L-1Ui inserts Ui’s smart card into a terminal and inputs IDi* and pwi*L-2The smart card computes the following.H_PWi*=h(pwi*)xs=Ci��h(IDs��H_PWi*)Bi*=h(H_PWi*��xs)The smart card compares Bi* with Bi. If, Bi*=Bi, then the next step proceeds; otherwise, this phase is aborted.L-3The smart card generates a random nonce RNi and computes the following. Ti is the current timestamp of Ui system.

DIDi=h(IDi��H_PWi*��xs)h(xs��RNi��Ti)MUi?G=h(AixsRNiTi)vi=RNixsThe smart card sends the authentication request DIDi, MUi?G, vi, Ti to GW.2.3. Authentication-Key Agreement PhaseWhen GW receives the authentication request from Ui, the authentication-key agreement Cilengitide phase begins. In this phase, Ui, GW, Sj and send and receive authentication requests from one another. Figure 3 depicts the authentication-key agreement phase of Vaidya et al.’s scheme. The following describes this process in detail.Figure 3.Authentication-key agreement phase of Vaidya et al.’s scheme [12].A-1GW checks if (TG?Ti) �� ��T, where TG is the current timestamp of GW system, and ��T is the maximum permitted transmission delay time. If (TG?Ti) �� ��T, then the next step proceeds; otherwise, this phase is aborted.

A-2GW computes the following.RNi=vixsX*=DIDih(xsRNiTi)MUi?G*=h((X*h(K))xsRNiTi)GW compares MUi?G* with MUi?G*. If MUi?G
Over time temperature monitoring has been an indispensable tool for sensing changes in many different processes and systems, in both research and industrial applications. Many diverse sectors, such as transport, control, automobile, industrial machinery, energy, medical, food, etc., are profiting from the incorporation of temperature sensor equipments.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>